General

  • Target

    2024-02-17_3fca52aa6e37afc728823f9022d93b74_cryptolocker

  • Size

    40KB

  • MD5

    3fca52aa6e37afc728823f9022d93b74

  • SHA1

    3cce478028f2d184a9bd767dc3bd9e9d0b52a0eb

  • SHA256

    949b7d81401f89b09321a713b904bf3b3bda0d149d4df22578701060213cb6a2

  • SHA512

    6b421e6f881872061f0e48e03439873d5d60e4505408dc4d0528cc8c2c9a56c36ffd3c9cb79945296e0bf57455efe8d2d4e7cd9a247d20cffd52f805c9b2140c

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/Ctv:6j+1NMOtEvwDpjrR2v

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_3fca52aa6e37afc728823f9022d93b74_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections